General
-
Target
RakBot.exe_infected
-
Size
1.1MB
-
Sample
241029-2w3x9s1hkq
-
MD5
0a4bcbacfca9876e5914933a8481391e
-
SHA1
91876f816adca7cd5eace2b23134eac094ea78ae
-
SHA256
708f1bcec066db275b751c43a2b92fe54ea5f82e33c61b0114a249476a9ad8d6
-
SHA512
7b089c7c6c6f22015cda9d74b8fbfcd7c29fad97c1eb62b3af6c3ab4b0b6994a07e258795ede117b7fab6057fca3c34de1afde010b830a5cbffdc78d42a598f7
-
SSDEEP
24576:l9h9ghwRVQAOBdlSER9MysrYx4ltFbc+Dyd8oC:lr9k3lPLMJYxEv0C
Static task
static1
Behavioral task
behavioral1
Sample
RakBot.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
RakBot.exe_infected
-
Size
1.1MB
-
MD5
0a4bcbacfca9876e5914933a8481391e
-
SHA1
91876f816adca7cd5eace2b23134eac094ea78ae
-
SHA256
708f1bcec066db275b751c43a2b92fe54ea5f82e33c61b0114a249476a9ad8d6
-
SHA512
7b089c7c6c6f22015cda9d74b8fbfcd7c29fad97c1eb62b3af6c3ab4b0b6994a07e258795ede117b7fab6057fca3c34de1afde010b830a5cbffdc78d42a598f7
-
SSDEEP
24576:l9h9ghwRVQAOBdlSER9MysrYx4ltFbc+Dyd8oC:lr9k3lPLMJYxEv0C
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1